when should this problem best be revisited?
During a data breach cleanup, it is discovered that not all of the sites involved have the necessary data
wiping tools. The necessary tools are quickly distributed to the required technicians, but when should this
problem best be revisited?
Which of the following will the audit team most l likely recommend during the audit out brief?
During a third-party audit, it is determined that a member of the firewall team can request, approve, and
implement a new rule-set on the firewall. Which of the following will the audit team most l likely
recommend during the audit out brief?
Which of the following will most likely fix the uploading issue for the users?
An administrator has configured a new Linux server with the FTP service. Upon verifying that the service
was configured correctly, the administrator has several users test the FTP service. Users report that they
are able to connect to the FTP service and download their personal files, however, they cannot transfer
new files to the server. Which of the following will most likely fix the uploading issue for the users?
Which of the following is the appropriate network structure used to protect servers…?
Which of the following is the appropriate network structure used to protect servers and services that
must be provided to external clients without completely eliminating access for internal users?
Which of the following actions will help detect attacker attempts to further alter log files?
An administrator thinks the UNIX systems may be compromised, but a review of system log files provides
no useful information. After discussing the situation with the security team, the administrator suspects
that the attacker may be altering the log files and removing evidence of intrusion activity. Which of the
following actions will help detect attacker attempts to further alter log files?
Which of the following controls reduces the risk created by malicious gaming customers attempting to circumven
A global gaming console manufacturer is launching a new gaming platform to its customers. Which of the
following controls reduces the risk created by malicious gaming customers attempting to circumvent
control by way of modifying consoles?
Which of the following access control methodologies would BEST mitigate this concern?
An audit has revealed that database administrators are also responsible for auditing database changes
and backup logs. Which of the following access control methodologies would BEST mitigate this concern?
what she will do?
Ann, a security administrator, has been instructed to perform fuzz-based testing on the company’s
applications. Which of the following best describes what she will do?
Which of the following is an appropriate control to use to prevent the other patron from accessing Joe’s lap
Joe, a technician, is working remotely with his company provided laptop at the coffee shop near his
home. Joe is concerned that another patron of the coffee shop may be trying to access his laptop. Which
of the following is an appropriate control to use to prevent the other patron from accessing Joe’s laptop
directly?
Which of the following describes this type of attack?
An attacker uses a network sniffer to capture the packets of a transaction that adds $20 to a gift card. The
attacker then user a function of the sniffer to push those packets back onto the network again, adding
another $20 to the gift card. This can be done many times. Which of the following describes this type of
attack?